CVE-2023-27482

10.0 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to bypass authentication and access the Supervisor API in Home Assistant, potentially gaining full control over the home automation system. It affects all Home Assistant installations using Supervisor 2023.01.1 or older, except container-based or manual Python installations. The vulnerability has been patched and auto-updated to most systems.

💻 Affected Systems

Products:
  • Home Assistant Supervisor
Versions: Supervisor 2023.01.1 and older
Operating Systems: All supported Home Assistant OS platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations using Home Assistant Supervisor. Container installations (Docker) and manual Python installations are NOT affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, access sensitive home automation data, modify device configurations, and potentially pivot to other network devices.

🟠

Likely Case

Unauthorized access to Supervisor API allowing attackers to install malicious add-ons, modify system configurations, or access sensitive home automation data.

🟢

If Mitigated

No impact if systems are patched to Supervisor 2023.03.1+ or Home Assistant Core 2023.3.0+, or if not exposed to the internet.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Detailed exploit documentation and proof-of-concept available in public advisories. Authentication bypass is straightforward once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Supervisor 2023.03.1 or Home Assistant Core 2023.3.0

Vendor Advisory: https://github.com/home-assistant/core/security/advisories/GHSA-2j8f-h4mr-qr25

Restart Required: Yes

Instructions:

1. Check current Supervisor version via Supervisor panel or CLI. 2. If on Supervisor 2023.01.1 or older, update to 2023.03.1+. 3. For Home Assistant Core, update to 2023.3.0+. 4. Most systems should have auto-updated via Supervisor's auto-update feature.

🔧 Temporary Workarounds

Network Isolation

all

Remove internet exposure for Home Assistant instance

# Configure firewall to block external access to Home Assistant ports (typically 8123)

🧯 If You Can't Patch

  • Immediately remove internet exposure/port forwarding for Home Assistant
  • Implement network segmentation to isolate Home Assistant from critical systems

🔍 How to Verify

Check if Vulnerable:

Check Supervisor version in Home Assistant UI under Supervisor → System or via CLI: ha supervisor info

Check Version:

ha supervisor info | grep version

Verify Fix Applied:

Confirm Supervisor version is 2023.03.1+ or Home Assistant Core is 2023.3.0+

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated API access to Supervisor endpoints
  • Unexpected add-on installations or modifications
  • Authentication bypass attempts in logs

Network Indicators:

  • Unusual API calls to Supervisor endpoints from external IPs
  • Traffic to Supervisor API without authentication headers

SIEM Query:

source="home-assistant" AND ("supervisor" OR "api") AND status="200" AND auth="none"

🔗 References

📤 Share & Export